Twhidden Bitwarden

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: twhidden-bitwarden Version: 1.0.5 The OpenClaw Bitwarden skill is benign. It provides a wrapper for the Bitwarden CLI, enabling password management functionalities like login, registration, and CRUD operations. The `bw.sh` script explicitly implements safe credential loading to prevent shell injection from configuration files, uses `chmod 600` for session tokens, and clearly documents all external communication with the user-configured Bitwarden server. While the `do_register` function in `bw.sh` involves complex cryptographic operations implemented in bash using `openssl`, it is for the stated purpose of account registration and shows no signs of malicious intent or unauthorized data exfiltration. No prompt injection attempts against the agent were found in `SKILL.md` or `README.md`.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If installed without strict tool policy, the agent may be able to read or store credentials from your vault during tasks without a separate human approval step.

Why it was flagged

The skill explicitly allows autonomous agent use for password retrieval and storage, which gives the agent direct access to highly sensitive account credentials.

Skill content
This skill can be invoked autonomously by your OpenClaw agent when it needs to:
- Store credentials securely
- Retrieve passwords for automation tasks
- Generate secure passwords
Recommendation

Use a dedicated Bitwarden/Vaultwarden account or collection with limited secrets, and require manual approval for password retrieval, creation, editing, and deletion.

What this means

A mistaken or overbroad agent action could modify or delete password vault entries.

Why it was flagged

The script exposes direct edit and delete operations against vault items after obtaining a session, with no confirmation or built-in guardrail in the skill.

Skill content
edit)
    ensure_session
    echo "$2" | bw encode | bw edit item "$1"
    ;;
  delete)
    ensure_session
    bw delete item "$1"
Recommendation

Configure OpenClaw tool policy to require approval for mutation commands, especially create, create-json, edit, delete, register, login, and logout.

What this means

Your Bitwarden master password could be exposed locally outside the intended OpenClaw process boundary on shared or monitored systems.

Why it was flagged

The master password is supplied to a child process as a command-line argument; on some systems, command-line arguments can be visible to other local users or process-monitoring tools.

Skill content
session=$(bw login "$BW_EMAIL" "$BW_MASTER_PASSWORD" --raw 2>/dev/null)
Recommendation

Prefer safer credential handling where possible, such as stdin-based unlock flows or a dedicated limited-access vault account, and avoid using this on shared machines.

What this means

If BW_SERVER is accidentally set to an HTTP or otherwise unsafe endpoint, sensitive authentication material could be transmitted without the protection the documentation implies.

Why it was flagged

The documentation says all communication uses HTTPS/TLS, but the script accepts any user-provided BW_SERVER value and does not enforce an https:// URL before sending registration data or configuring the Bitwarden CLI.

Skill content
**What leaves your machine:**
- Authentication requests (email, master password) to your configured Bitwarden server
- Encrypted vault data (create/read/update/delete operations)
- All communication uses HTTPS/TLS
Recommendation

Only configure trusted HTTPS Bitwarden/Vaultwarden URLs; the skill should ideally validate BW_SERVER and refuse non-HTTPS endpoints unless the user explicitly opts in.

What this means

A local compromise or misconfiguration could expose a live vault session token.

Why it was flagged

The skill caches a reusable Bitwarden session token on disk. This is disclosed and permissioned to 600, but it persists beyond a single command until lock/logout or expiry.

Skill content
SESSION_FILE="/tmp/.bw_session"
...
echo "$session" > "$SESSION_FILE"
chmod 600 "$SESSION_FILE"
Recommendation

Run `bw.sh lock` or `bw.sh logout` when done, avoid shared systems, and consider isolating OpenClaw’s workspace and runtime user account.

What this means

Some commands, especially registration, may fail or behave unexpectedly if these tools are absent or incompatible.

Why it was flagged

The script depends on additional local tools beyond the registry’s required binaries list, so environment validation may not catch every missing dependency before use.

Skill content
# Dependencies: bash, openssl (3.x+), curl, bw CLI, xxd, grep, base64
Recommendation

Verify the installed local tools before use, and prefer a pinned, reviewed Bitwarden CLI installation.